Put Cutter’s Experts to Work on Your Challenges

Cutter has no off-the-shelf consulting solutions — we view each assignment as unique, assembling a team custom-fit for your requirements, culture, budget, and business drivers. From business technology strategy development to enterprise architecture assessments, digital business transformation, to developing a customized software development framework, Cutter's experts deliver powerful solutions. See sample Cutter Consulting offerings by selecting one or any of the practice areas below.

Value Project Portfolio Management

Bob Benson

Every IT project should deliver business value. The challenge is that traditional project management and PMOs focus on "on time" and "on budget," not achievement of business value. Cutter's Value Project Portfolio Management (Value-PPM) approach ensures organizations achieve all three goals.


Negotiating Complex Deals

Sara Cullen

Steering complex deals requires fine-tuned negotiation skills — skills most IT executives are not trained in. But Cutter Senior Consultant Sara Cullen is. With a doctorate in contracts and the experience of assisting more than 140 deals, you could not put a better expert on your team than Sara Cullen.


Financial Management of Information Technology

Bob Benson

This engagement equips business executives, CIOs, IT executives, IT financial managers, and CFOs with the tools and processes they need to answer the following questions:


Metrics Program Development

Take advantage of the opportunity to take a more thorough look at how efficient and productive your software development efforts are ... and can be.


Strategy Meeting Facilitation

Cutter Senior Consultants and Fellows are experts at facilitating both business and IT strategy sessions.


Offshore Due Diligence

The offshore outsourcing specialists on Cutter Consortium's team are prepared to lead trips to India, Poland, or other countries, for client companies that are investigating offshore opportunities.


Optimization Review

Tim Lister

The Optimization Review, typically two days, is designed to identify the most promising opportunities for change by identifying what separates a company from the norm. This unique approach, developed by Tom DeMarco and Tim Lister, is designed to finesse change resistance, and has proven repeatedly to be both a tremendous morale-builder and an extremely effective change mechanism.


Organizational Development Assessments

IT Organizational Assessments examine the strengths and weaknesses of your organization so you can capitalize on the former and correct the latter.


Security Risk Assessment and Review

Cutter Consortium is available for risk assessments, network assessments, application reviews, security-oriented design reviews, site and facility surveys, and configuration or source code reviews.


Outsourcing Implementation Support

The Consortium is prepared to help you throughout the lifetime of your sourcing agreement.


Security and Privacy Policies, Procedures, Standards and Guidelines

Rebecca Herold

Rebecca Herold will create Security and Privacy Policies, Procedures, Standards and Guidelines policies, procedures, standards and guideline for your organization.


Project Office Development

Our Senior Consultants will work with you to design, build, and implement an independent Project Office that will enable you to consistently collect data, analyze it, and present the results.


Security Implementation and Operations

We can help you install and configure applications, deploy security systems as well as intrusion detection systems. Our operations support services include firewall and critical infrastructure management, incident response, system administration. If desired, we can even serve as acting-Chief Security Officer (CSO) while you conduct a search.


Litigation Support for Software Intensive Projects

Tim Lister

Let Cutter help you with vetting potential partners, understanding and quantifying schedules, requirements, specs, and risk management before signing contracts, to successfully prosecuting or defending against an IT-related lawsuit.